JIGSPASSZLE: A novel Jigsaw
based authentication System using
Mouse Drag Dynamics
GUIDE:
Mr. S. M.UDHAYASANKAR
Assistant Professor-III
Submitted By:
VISWAPRASATH KS
THANGARAJ R
JEYASIMMAN S
AGENDA
• Abstract
• Objective
• Motivation
• Literature Survey
• Existing System
Drawbacks
• Proposed System
• Securities ...
ABSTRACT
In this paper
we used an image based authentication
system which uses the ability of the human to
recognize the ...
OBJECTIVE
Our main Objective are
To develop a multiple factor authentication
system images.
(Biometrics +Conventional + r...
MOTIVATION
As State in the paper “A complete comparison on
Pure and Cued Recall-Based Graphical User
Authentication Algori...
LITERATURE SURVEY
Adams, A., in “Users are not the enemy (1999)”
-They state how each and every module should make user f...
LITERATURE SURVEY(contd..)
Rohit Ashok Khot in his “paper MARASIM: A Novel Jigsaw
Based Authentication Scheme Using Taggi...
Mori, T. in their paper “Proposal of Movie CAPTCHA method
using Amodel Completion”
-show how in any image based system we...
22
EXISTING SYSTEM
They are lot number of existing system based on media
like text based, image based and sound based.
Som...
PROPOSED SYSTEM
In our proposed system the user needs to form the
password by selecting the parts of the picture he needs...
PROPOSED SYSTEM(contd..)
Registration In our System.
Uploading the Image
Selecting the order of Passimages
Positioning ...
PROPOSED SYSTEM(contd..)
Uploading the Image
The user needs to upload his private images. Reason is
that it cannot be eas...
PROPOSED SYSTEM(contd..)
Selecting the order of Passimages
After uploading the image the user is shown with the
sliced im...
PROPOSED SYSTEM(contd..)
Positioning for getting the time
Then after selecting the user is requested to position the
imag...
SECURITIES ADDRESS
In our authentication system we would mainly concentrate
on Brute force, shoulder suffering, Key logger...
SECURITIES ADDRESS(contd..)
Key loggers
It is found that the key loggers or spywares are very
difficult to design for mult...
MODULES
In our proposed System we have
developed the following modules.
Registration
Login Authentication
Forget Passwo...
MODULES(contd..)
Registration
The user needs to give his mail ID, if it is not found
then he can start registration by gi...
MODULES(contd..)
Login Authentication
In the first stage the user needs to give his text based
email ID and password.
Th...
SCREEN SHOTS
SCREEN SHOTS(contd..)
SCREEN SHOTS(contd..)
SCREEN SHOTS(contd..)
COMPARISON
Easy to use Prefer Over Text password
0
10
20
30
40
50
60
70
80
90
100
Yes
No
Graph showing willingness of user
Own User Other user 1 Other user 2 Other user 3 Other user 4
0
1
2
3
4
5
6
7
Average Time taken to set password with other...
COMPARISON(contd..)
Own User Other user 1 Other user 2 Other user 3 Other user 4
0
1
2
3
4
5
6
Time to set Other user pass...
ADVANTAGES
It is easy to remember and identify different part of
whole image
.
Our system is multi factor authentication...
FUTURE WORK
In future we need to analyze any public image can be used
as authentication.
We can make our working of the pr...
CONCLUSION
We would like to conclude our proposed system is stronger
when compared with other image based authentication ...
REFERENCES
Rohit Ashok Khot , Kannan Srinathan , Ponnurangam Kumaraguru ,
MARASIM: A Novel Jigsaw Based Authentication Sch...
Fabian Monrose,Michael K. Reiter,Susanne Wetzel, Password hardening
based on keystroke dynamics, In Proc International Jou...
Dhamija, R. Hash visualization in user authentication. In Ext. Abstracts
CHI 2000, ACM Press (2000), 279-280.
Fabian Monro...
Farnaz Towhidi,Maslin Masrom “A Survey on Recognition-Based Graphical
User Authentication Algorithms ” In Proc (IJCSIS) In...
THANK YOU
Upcoming SlideShare
Loading in …5
×

JIGSPASSZLE : A novel Jigsaw based authentication System using Mouse Drag Dynamics

466 views

Published on

My final semester Project regarding the authentication system which is based on Image and also has biometrics based on mouse drag.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
466
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

JIGSPASSZLE : A novel Jigsaw based authentication System using Mouse Drag Dynamics

  1. 1. JIGSPASSZLE: A novel Jigsaw based authentication System using Mouse Drag Dynamics
  2. 2. GUIDE: Mr. S. M.UDHAYASANKAR Assistant Professor-III Submitted By: VISWAPRASATH KS THANGARAJ R JEYASIMMAN S
  3. 3. AGENDA • Abstract • Objective • Motivation • Literature Survey • Existing System Drawbacks • Proposed System • Securities Addressed • Modules • Advantages Of Proposed System • Conclusion • References
  4. 4. ABSTRACT In this paper we used an image based authentication system which uses the ability of the human to recognize the image with. we use drag action either using the mouse or using touch in the screens as biometrics. we have used One Time Passwords (OTP) which is not dependent on any external devices.
  5. 5. OBJECTIVE Our main Objective are To develop a multiple factor authentication system images. (Biometrics +Conventional + recognizable ) To avoid the hardware dependency for OTP. To avoid attacks like shoulder surfing, guessing, key loggers
  6. 6. MOTIVATION As State in the paper “A complete comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms” user were fascinated by the pictures which drawn by other users so frequently we can see the common picture for password. users can hardly remember the sequence of drawing after period of time.
  7. 7. LITERATURE SURVEY Adams, A., in “Users are not the enemy (1999)” -They state how each and every module should make user feel he is safe. Kulkarni. in his paper “Security Analysis and Implementation of 3 Level Security System Using Image Based Authentication (2013)” -He also tell how the combination of both text based password and image based password and OTP will be very complex to break. Mrs. D. shanmugapriya in “A survey of Biometric Keystroke Dynamics: Approaches, Security and Challenges (2009)” - Show how different types of biometrics based passwords can be achieved.
  8. 8. LITERATURE SURVEY(contd..) Rohit Ashok Khot in his “paper MARASIM: A Novel Jigsaw Based Authentication Scheme Using Tagging”, -shows that how the image based authentication will be very easy for the user. Graphical Passwords: A Survey by Xiaoyuan Suo, -clearly shows us the various loop holes in the existing graphical passwords. They have shown that most of the graphical passwords are easily attacked. Nitisha Payal, in“JigCAPTCHA: An Advanced Image- BasedCAPTCHA Integrated with Jigsaw PiecePuzzle using AJAX” (2011) -shows clearly how we should transfer the small pieces of images.
  9. 9. Mori, T. in their paper “Proposal of Movie CAPTCHA method using Amodel Completion” -show how in any image based system we can avoid attacks from the bots. Farnaz Towhidi in “A Survey on Recognition-Based Graphical User Authentication Algorithms(2009)” -showed in detail how the Recognition based Graphical authentication are very easy for the users to use. Saurabh Singh in their paper “Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse” (2011) told how a mouse interaction can be used as a authentication system LITERATURE SURVEY(contd..)
  10. 10. 22 EXISTING SYSTEM They are lot number of existing system based on media like text based, image based and sound based. Some of the image based password faced lot of drawbacks Response time is very high due to transfer of images. They didn’t had biometrics due to which faced many problems. Not able to reproduce what they have drawn. Attacks like brute force , shoulder suffering , and dictionary attacks
  11. 11. PROPOSED SYSTEM In our proposed system the user needs to form the password by selecting the parts of the picture he needs to use. Here the parts of the images are used for creating the password, so we would like to call them as Passimages. He should remember the order in which he selects the Passimages and has to position them in the grid according to the One Time PIN (OTP) which appears on the screen during login.
  12. 12. PROPOSED SYSTEM(contd..) Registration In our System. Uploading the Image Selecting the order of Passimages Positioning for getting the time
  13. 13. PROPOSED SYSTEM(contd..) Uploading the Image The user needs to upload his private images. Reason is that it cannot be easily identified by bots or other attackers. Then the image is Sliced into smaller parts in 3x3 fashion. So we will get 9 small images. The reason for dividing is we are introducing amodel Completion. i.e., the user can remember the big part from small part.
  14. 14. PROPOSED SYSTEM(contd..) Selecting the order of Passimages After uploading the image the user is shown with the sliced images. Where he can know about the smaller images. The he is requested to select any 6 images out of 9 possible images. During this he makes the order he wants to use
  15. 15. PROPOSED SYSTEM(contd..) Positioning for getting the time Then after selecting the user is requested to position the images according to the OTP displayed in the browser. While the user is placing that time we will be capturing the time he places. We will find the total time and average time. Total Time (Tt) = Sum of all time taken to place image. Average Time (At) = Total time / Number of Pieces of slices to be placed Number of slices to be placed can be from 6 to 4.
  16. 16. SECURITIES ADDRESS In our authentication system we would mainly concentrate on Brute force, shoulder suffering, Key loggers and dictionary attacks. Brute force Attack There is no possibility for brute force attack because we are dragging the image and drop at the same time we are capturing the time taken to place the image. Shoulder suffering Attacker can see the image and can learn about the order. But he feels it difficult sometimes to order them so time taken will be very high.
  17. 17. SECURITIES ADDRESS(contd..) Key loggers It is found that the key loggers or spywares are very difficult to design for multi level authentication and especially for Image based authentication. Dictionary attacks Since private images used by the users there wont be any possibilities of dictionary attacks.
  18. 18. MODULES In our proposed System we have developed the following modules. Registration Login Authentication Forget Password
  19. 19. MODULES(contd..) Registration The user needs to give his mail ID, if it is not found then he can start registration by giving his name and password he need. Then he needs to upload the image. The Image will be uploaded and sliced and then displayed. Then the user will choose his image order. After that he is displayed with OTP and then made to place the images.
  20. 20. MODULES(contd..) Login Authentication In the first stage the user needs to give his text based email ID and password. Then he is displayed with OTP and sliced small images. Then he can position the images according to the OTP.
  21. 21. SCREEN SHOTS
  22. 22. SCREEN SHOTS(contd..)
  23. 23. SCREEN SHOTS(contd..)
  24. 24. SCREEN SHOTS(contd..)
  25. 25. COMPARISON Easy to use Prefer Over Text password 0 10 20 30 40 50 60 70 80 90 100 Yes No Graph showing willingness of user
  26. 26. Own User Other user 1 Other user 2 Other user 3 Other user 4 0 1 2 3 4 5 6 7 Average Time taken to set password with other images COMPARISON(contd..)
  27. 27. COMPARISON(contd..) Own User Other user 1 Other user 2 Other user 3 Other user 4 0 1 2 3 4 5 6 Time to set Other user password
  28. 28. ADVANTAGES It is easy to remember and identify different part of whole image . Our system is multi factor authentication system. Our system uses biometrics so it is difficult for any other to use. No need of additional hardware for OTP’s
  29. 29. FUTURE WORK In future we need to analyze any public image can be used as authentication. We can make our working of the project complex in such a way that our algorithm can find different parts of the image and understand it and expand dynamically. We need to find the way to increase the number of slice of the images, currently we are using 9 since it is standard. And we have only 0-9 in our keyboards.
  30. 30. CONCLUSION We would like to conclude our proposed system is stronger when compared with other image based authentication systems. Here our proposed system is completely based on user recall and reorganization ability. We have strengthened our proposed system by adding the time taken ability of the drag by the user with the help of mouse. Our system will be very useful in touch based monitors and can be use in mobile commerce / electronic commerce based website for conforming the purchase. Our System looks like gamified which is additional advantage in corporate sectors where the trend is changing.
  31. 31. REFERENCES Rohit Ashok Khot , Kannan Srinathan , Ponnurangam Kumaraguru , MARASIM: A Novel Jigsaw Based Authentication Scheme Using Tagging , In Proc. ACM CHI (2011), 2605-2614 Anand, S. ; Jain, P. ; Nitin ; Rastogi, R, Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication In Proc of Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference, 547-553 Nitisha Payal, Nidhi Chaudhary, Parma Nand Astya JigCAPTCHA: An Advanced Image-BasedCAPTCHA Integrated with Jigsaw PiecePuzzle using AJAX, IJSCE Volume-2, Issue-5 (2012), 180-185 Mori, T. Uda, R. ; Kikuchi, M. ,Proposal of Movie CAPTCHA method using Amodel Completion , In Proc. Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium, 11-18
  32. 32. Fabian Monrose,Michael K. Reiter,Susanne Wetzel, Password hardening based on keystroke dynamics, In Proc International Journal of Information Security February 2002, Volume 1, Issue 2, 69-83 Nasir Ahmad , Andrea Szymkowiak and Paul A. Campbell , Keystroke dynamics in the pre-touchscreen era In Proc Front. Hum. Neurosci. doi: 10.3389/fnhum.2013.00835 Dec (2013) Adams, A., and Sasse, M. A. Users are not the enemy. Commun. ACM. 42, 12 (1999), 40-46. MORRIS, R., AND THOMPSON, K. Password security: a case history. Commun. ACM 22, 11 (1979), 594–597. Collin Mulliner,Ravishankar Borgaonkar,Patrick Stewin, Jean-Pierre Seifert,SMS-Based One-Time Passwords: Attacks and Defense.In Proc 10th International Conference, DIMVA 2013, Berlin, Germany, (2013), 150-159 REFERENCES(contd..)
  33. 33. Dhamija, R. Hash visualization in user authentication. In Ext. Abstracts CHI 2000, ACM Press (2000), 279-280. Fabian Monrose ,Aviel D. Rubin ,Keystroke dynamics as a biometric for authentication,In Proc.Future Generation Computer Systems - Special issue on security on the Web archive Volume 16 Issue 4,( 2000 )351 – 359 Cranor, L., and Garfinkel, S. Security and Usability: Designing Systems that People can use. O’reilly Media, 2005. Arash Habibi Lashkari ,DR. ROSLI SALEH, SAMANEH FARMAND , FARNAZ TOWHIDI “A complete comparison on Pure and Cued Recall-Based Graphical User Authentication Algorithms ” In Proc. Second International Conference on Computer and Electrical Engineering (2009) REFERENCES(contd..)
  34. 34. Farnaz Towhidi,Maslin Masrom “A Survey on Recognition-Based Graphical User Authentication Algorithms ” In Proc (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 2, (2009 ) Mrs. D. Shanmugapriya , Dr. G. Padmavathi “A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges” In Proc International Journal of Computer Science and Information Security (2009) Saurabh Singh , Dr. K.V.Arya, “Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse” In proc International Journal of Computer Applications (2011) Mudassar Raza, Muhammad Iqbal, Muhammad Sharif and Waqas Haider “A Survey of Password Attacks and Comparative Analysis onMethods for Secure Authentication” In proc World Applied Sciences Journal 19( 2012) REFERENCES(contd..)
  35. 35. THANK YOU

×